Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 16, 2025

    Linux Boot Process? Best Geeks Know It!

    May 16, 2025

    Microsoft’s Surface lineup reportedly losing another of its most interesting designs

    May 16, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Look out! CapCut copycats are on the prowl
    Cyber Security

    Look out! CapCut copycats are on the prowl

    MichaBy MichaApril 22, 2025No Comments4 Mins Read
    Look out! CapCut copycats are on the prowl


    Cybercriminals lure content material creators with guarantees of cutting-edge AI wizardry, solely to aim to steal their knowledge or hijack their units as a substitute

    Christian Ali Bravo
    Tomáš Foltýn

    17 Apr 2025
     • 
    ,
    3 min. learn

    CapCut copycats are on the prowl

    The craze round generative AI instruments isn’t simply reshaping industries – it additionally offers fertile floor for cybercriminals, who’re at all times fast to piggyback on the attract of the most recent large factor in tech. So what if, as a substitute of downloading an AI‑generated video from CapCut or one other comparable instrument, you had your knowledge stolen or gave management of your laptop to a stranger?

    The risk isn’t hypothetical – safety researchers have beforehand noticed campaigns that exploited CapCut’s recognition to distribute a number of infostealers and different malware. Let’s now look briefly at one other marketing campaign that’s focusing on folks concerned with AI-powered content material by promising premium variations of in style software program resembling CapCut, Adobe Specific and Canva.

    The artwork of the lure

    The instance under, noticed by X consumer g0njxa, exhibits a web site that impersonates CapCut, a instrument typically utilized by TikTok creators, and purports to be CapCut’s premium model. (Be aware that the precise premium model is named “CapCut Professional” or referred to easily as “Professional” on the web site, not “CapCutProAI” as within the screenshot.)

    Figure 1a. Fake CapCut site - homepage

    After you land on the pretend web site, you’re requested to enter a immediate or add a reference file. If you happen to comply, the location will mimic processing the request.

    Figure 1. Fake CapCut site

    As soon as the anticipation is constructed and the entice is sprung, you’re prompted to obtain your shiny new “creation”. Needles to say, the file, referred to as Creation_Made_By_CapCut.mp4 – CapCut.com, is way from what it purports to be. In actuality, it’s an executable for distant entry software program. Quick ahead just a few clicks and, except different safeguards kick in, you may be surrendering management of your gadget to crooks.

    Figure 2. Fake CapCut site

    Listed here are two extra websites that masquerade as the true deal and are a part of the identical marketing campaign:

    Figure 3. Fake Adobe Express site

    Figure 4. Fake Canva site

    Faraway, so shut

    For context, whereas reputable distant entry instruments, resembling ConnectWise ScreenConnect, TeamViewer and AnyDesk, are invaluable for IT professionals offering technical assist, within the fallacious arms they are often misused to take over management of your laptop for malicious ends. These embody knowledge theft, set up of ransomware or different malware, and utilizing the compromised machine as a launch pad for assaults at different units.

    These sorts of threats additionally loom giant on company networks, as risk actors can, for instance, distribute transportable, self-contained executables for reputable distant monitoring and administration (RMM) software program that circumvents admin privileges and obviates the necessity for full software program set up.

    “Most distant management purposes include the choice to generate a preconfigured executable to hook up with a selected IP deal with or consumer. That is helpful for distant help, but additionally for attackers. The sufferer merely has to open the file, and in a few clicks, they could unwittingly give management of their laptop to a cybercriminal,” says Martina López, a safety researcher with ESET’s lab in Latin America.

    Phrase to the clever

    A few easy steps will go a great distance towards maintaining you secure:

    • When downloading new software program, ensure to get it from the reputable supply, usually the writer’s official web site
    • Keep away from clicking on unsolicited hyperlinks in e mail or social media messages that always declare to result in such web sites – the messages could also be pretend
    • The identical goes for adverts – you’re higher off navigating to the web site instantly by typing it in your browser or looking for it (with a important eye, although) in your search engine of alternative
    • Examine the web site’s URL – software program makers don’t usually sport numerous oddball extensions in URLs or sneaky “alternate” variations (assume “CapCutProAI”)
    • Be sure your working system, browser, and different software program are updated to guard in opposition to identified vulnerabilities
    • Use multi-layered safety software program, in addition to stick with different primary cybersecurity hygiene practices, resembling robust and distinctive passwords and enabling two-factor authentication on all of your on-line accounts

    Evidently, that is neither the primary nor final time CapCut customers have been focused by cybercriminals, and these examples simply present that cybercriminals are at all times keen to take advantage of belief and the most recent large factor in tech.

    The excellent news is that that whereas these ploys are sometimes slick, they’re not invincible. Your vigilance is your greatest protect in opposition to scammers’ ways.



    Supply hyperlink

    0 Like this
    CapCut copycats prowl
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleManage with Folders, Tags, Hyperlinks
    Next Article Generative AI is reshaping South Korea’s webcomics trade

    Related Posts

    Cyber Security

    Where To Look For The Next Cybersecurity Unicorn

    May 16, 2025
    Cyber Security

    US charges 12 more suspects linked to $230 million crypto theft

    May 16, 2025
    Cyber Security

    Top 10 Best Practices for Effective Data Protection

    May 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.